Fix spelling errors.
This commit is contained in:
parent
8297edd549
commit
e3fa23bcb6
29 changed files with 36 additions and 36 deletions
|
@ -185,7 +185,7 @@ impl<T: Share + Send> Drop for Arc<T> {
|
||||||
// deletion of the data. Because it is marked `Release`, the
|
// deletion of the data. Because it is marked `Release`, the
|
||||||
// decreasing of the reference count synchronizes with this `Acquire`
|
// decreasing of the reference count synchronizes with this `Acquire`
|
||||||
// fence. This means that use of the data happens before decreasing
|
// fence. This means that use of the data happens before decreasing
|
||||||
// the refernce count, which happens before this fence, which
|
// the reference count, which happens before this fence, which
|
||||||
// happens before the deletion of the data.
|
// happens before the deletion of the data.
|
||||||
//
|
//
|
||||||
// As explained in the [Boost documentation][1],
|
// As explained in the [Boost documentation][1],
|
||||||
|
|
|
@ -124,7 +124,7 @@ impl Drop for Stack {
|
||||||
}
|
}
|
||||||
|
|
||||||
pub struct StackPool {
|
pub struct StackPool {
|
||||||
// Ideally this would be some datastructure that preserved ordering on
|
// Ideally this would be some data structure that preserved ordering on
|
||||||
// Stack.min_size.
|
// Stack.min_size.
|
||||||
stacks: Vec<Stack>,
|
stacks: Vec<Stack>,
|
||||||
}
|
}
|
||||||
|
|
|
@ -288,7 +288,7 @@ pub fn mod_enabled(level: u32, module: &str) -> bool {
|
||||||
unsafe { INIT.doit(init); }
|
unsafe { INIT.doit(init); }
|
||||||
|
|
||||||
// It's possible for many threads are in this function, only one of them
|
// It's possible for many threads are in this function, only one of them
|
||||||
// will peform the global initialization, but all of them will need to check
|
// will perform the global initialization, but all of them will need to check
|
||||||
// again to whether they should really be here or not. Hence, despite this
|
// again to whether they should really be here or not. Hence, despite this
|
||||||
// check being expanded manually in the logging macro, this function checks
|
// check being expanded manually in the logging macro, this function checks
|
||||||
// the log level again.
|
// the log level again.
|
||||||
|
|
|
@ -877,7 +877,7 @@ pub fn write<T>(fd: sock_t,
|
||||||
}
|
}
|
||||||
|
|
||||||
// Also as with read(), we use MSG_DONTWAIT to guard ourselves
|
// Also as with read(), we use MSG_DONTWAIT to guard ourselves
|
||||||
// against unforseen circumstances.
|
// against unforeseen circumstances.
|
||||||
let _guard = lock();
|
let _guard = lock();
|
||||||
let ptr = buf.slice_from(written).as_ptr();
|
let ptr = buf.slice_from(written).as_ptr();
|
||||||
let len = buf.len() - written;
|
let len = buf.len() - written;
|
||||||
|
|
|
@ -376,7 +376,7 @@ impl rtio::RtioPipe for UnixStream {
|
||||||
if ret != 0 { return Ok(bytes_read as uint) }
|
if ret != 0 { return Ok(bytes_read as uint) }
|
||||||
|
|
||||||
// If our errno doesn't say that the I/O is pending, then we hit some
|
// If our errno doesn't say that the I/O is pending, then we hit some
|
||||||
// legitimate error and reeturn immediately.
|
// legitimate error and return immediately.
|
||||||
if os::errno() != libc::ERROR_IO_PENDING as uint {
|
if os::errno() != libc::ERROR_IO_PENDING as uint {
|
||||||
return Err(super::last_error())
|
return Err(super::last_error())
|
||||||
}
|
}
|
||||||
|
|
|
@ -31,7 +31,7 @@
|
||||||
#![no_std]
|
#![no_std]
|
||||||
#![experimental]
|
#![experimental]
|
||||||
|
|
||||||
// This library is definining the builtin functions, so it would be a shame for
|
// This library defines the builtin functions, so it would be a shame for
|
||||||
// LLVM to optimize these function calls to themselves!
|
// LLVM to optimize these function calls to themselves!
|
||||||
#![no_builtins]
|
#![no_builtins]
|
||||||
|
|
||||||
|
|
|
@ -119,7 +119,7 @@ pub mod write {
|
||||||
// get all hardware potential via VFP3 (hardware floating point)
|
// get all hardware potential via VFP3 (hardware floating point)
|
||||||
// and NEON (SIMD) instructions supported by LLVM.
|
// and NEON (SIMD) instructions supported by LLVM.
|
||||||
// Note that without those flags various linking errors might
|
// Note that without those flags various linking errors might
|
||||||
// arise as some of intrinsicts are converted into function calls
|
// arise as some of intrinsics are converted into function calls
|
||||||
// and nobody provides implementations those functions
|
// and nobody provides implementations those functions
|
||||||
fn target_feature<'a>(sess: &'a Session) -> &'a str {
|
fn target_feature<'a>(sess: &'a Session) -> &'a str {
|
||||||
match sess.targ_cfg.os {
|
match sess.targ_cfg.os {
|
||||||
|
|
|
@ -985,7 +985,7 @@ impl UnnecessaryParens {
|
||||||
_ => {}
|
_ => {}
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Expressions that syntatically contain an "exterior" struct
|
/// Expressions that syntactically contain an "exterior" struct
|
||||||
/// literal i.e. not surrounded by any parens or other
|
/// literal i.e. not surrounded by any parens or other
|
||||||
/// delimiters, e.g. `X { y: 1 }`, `X { y: 1 }.method()`, `foo
|
/// delimiters, e.g. `X { y: 1 }`, `X { y: 1 }.method()`, `foo
|
||||||
/// == X { y: 1 }` and `X { y: 1 } == foo` all do, but `(X {
|
/// == X { y: 1 }` and `X { y: 1 } == foo` all do, but `(X {
|
||||||
|
|
|
@ -383,7 +383,7 @@ impl<'t,TYPER:Typer> MemCategorizationContext<'t,TYPER> {
|
||||||
Some(adjustment) => {
|
Some(adjustment) => {
|
||||||
match *adjustment {
|
match *adjustment {
|
||||||
ty::AutoObject(..) => {
|
ty::AutoObject(..) => {
|
||||||
// Implicity cast a concrete object to trait object.
|
// Implicitly cast a concrete object to trait object.
|
||||||
// Result is an rvalue.
|
// Result is an rvalue.
|
||||||
let expr_ty = if_ok!(self.expr_ty_adjusted(expr));
|
let expr_ty = if_ok!(self.expr_ty_adjusted(expr));
|
||||||
Ok(self.cat_rvalue_node(expr.id(), expr.span(), expr_ty))
|
Ok(self.cat_rvalue_node(expr.id(), expr.span(), expr_ty))
|
||||||
|
|
|
@ -1267,7 +1267,7 @@ impl<'a> Visitor<()> for VisiblePrivateTypesVisitor<'a> {
|
||||||
// error messages without (too many) false positives
|
// error messages without (too many) false positives
|
||||||
// (i.e. we could just return here to not check them at
|
// (i.e. we could just return here to not check them at
|
||||||
// all, or some worse estimation of whether an impl is
|
// all, or some worse estimation of whether an impl is
|
||||||
// publically visible.
|
// publicly visible.
|
||||||
ast::ItemImpl(ref g, ref trait_ref, self_, ref methods) => {
|
ast::ItemImpl(ref g, ref trait_ref, self_, ref methods) => {
|
||||||
// `impl [... for] Private` is never visible.
|
// `impl [... for] Private` is never visible.
|
||||||
let self_contains_private;
|
let self_contains_private;
|
||||||
|
|
|
@ -484,7 +484,7 @@ impl <'l> DxrVisitor<'l> {
|
||||||
{
|
{
|
||||||
let qualname = self.analysis.ty_cx.map.path_to_str(item.id);
|
let qualname = self.analysis.ty_cx.map.path_to_str(item.id);
|
||||||
|
|
||||||
// If the variable is immutable, save the initialising expresion.
|
// If the variable is immutable, save the initialising expression.
|
||||||
let value = match mt {
|
let value = match mt {
|
||||||
ast::MutMutable => String::from_str("<mutable>"),
|
ast::MutMutable => String::from_str("<mutable>"),
|
||||||
ast::MutImmutable => self.span.snippet(expr.span),
|
ast::MutImmutable => self.span.snippet(expr.span),
|
||||||
|
@ -845,7 +845,7 @@ impl <'l> DxrVisitor<'l> {
|
||||||
let decl_id = ty::trait_method_of_method(&self.analysis.ty_cx, def_id);
|
let decl_id = ty::trait_method_of_method(&self.analysis.ty_cx, def_id);
|
||||||
|
|
||||||
// This incantation is required if the method referenced is a trait's
|
// This incantation is required if the method referenced is a trait's
|
||||||
// defailt implementation.
|
// default implementation.
|
||||||
let def_id = ty::method(&self.analysis.ty_cx, def_id).provided_source
|
let def_id = ty::method(&self.analysis.ty_cx, def_id).provided_source
|
||||||
.unwrap_or(def_id);
|
.unwrap_or(def_id);
|
||||||
(Some(def_id), decl_id)
|
(Some(def_id), decl_id)
|
||||||
|
@ -1403,7 +1403,7 @@ pub fn process_crate(sess: &Session,
|
||||||
info!("Writing output to {}", disp);
|
info!("Writing output to {}", disp);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create ouput file.
|
// Create output file.
|
||||||
let mut out_name = cratename.clone();
|
let mut out_name = cratename.clone();
|
||||||
out_name.push_str(".csv");
|
out_name.push_str(".csv");
|
||||||
root_path.push(out_name);
|
root_path.push(out_name);
|
||||||
|
|
|
@ -93,7 +93,7 @@ pub struct UnificationTable<K,V> {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* At any time, users may snapshot a unification table. The changes
|
* At any time, users may snapshot a unification table. The changes
|
||||||
* made during the snapshot may either be *commited* or *rolled back*.
|
* made during the snapshot may either be *committed* or *rolled back*.
|
||||||
*/
|
*/
|
||||||
pub struct Snapshot<K> {
|
pub struct Snapshot<K> {
|
||||||
// Ensure that this snapshot is keyed to the table type.
|
// Ensure that this snapshot is keyed to the table type.
|
||||||
|
@ -152,7 +152,7 @@ impl<V:PartialEq+Clone+Repr,K:UnifyKey<V>> UnificationTable<K,V> {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Starts a new snapshot. Each snapshot must be either
|
* Starts a new snapshot. Each snapshot must be either
|
||||||
* rolled back or commited in a "LIFO" (stack) order.
|
* rolled back or committed in a "LIFO" (stack) order.
|
||||||
*/
|
*/
|
||||||
pub fn snapshot(&mut self) -> Snapshot<K> {
|
pub fn snapshot(&mut self) -> Snapshot<K> {
|
||||||
let length = self.undo_log.len();
|
let length = self.undo_log.len();
|
||||||
|
@ -188,12 +188,12 @@ impl<V:PartialEq+Clone+Repr,K:UnifyKey<V>> UnificationTable<K,V> {
|
||||||
match self.undo_log.pop().unwrap() {
|
match self.undo_log.pop().unwrap() {
|
||||||
OpenSnapshot => {
|
OpenSnapshot => {
|
||||||
// This indicates a failure to obey the stack discipline.
|
// This indicates a failure to obey the stack discipline.
|
||||||
tcx.sess.bug("Cannot rollback an uncommited snapshot");
|
tcx.sess.bug("Cannot rollback an uncommitted snapshot");
|
||||||
}
|
}
|
||||||
|
|
||||||
CommittedSnapshot => {
|
CommittedSnapshot => {
|
||||||
// This occurs when there are nested snapshots and
|
// This occurs when there are nested snapshots and
|
||||||
// the inner is commited but outer is rolled back.
|
// the inner is committed but outer is rolled back.
|
||||||
}
|
}
|
||||||
|
|
||||||
NewVar(i) => {
|
NewVar(i) => {
|
||||||
|
|
|
@ -1737,7 +1737,7 @@ pub struct ViewItem {
|
||||||
|
|
||||||
impl Clean<Vec<Item>> for ast::ViewItem {
|
impl Clean<Vec<Item>> for ast::ViewItem {
|
||||||
fn clean(&self) -> Vec<Item> {
|
fn clean(&self) -> Vec<Item> {
|
||||||
// We consider inlining the documentation of `pub use` statments, but we
|
// We consider inlining the documentation of `pub use` statements, but we
|
||||||
// forcefully don't inline if this is not public or if the
|
// forcefully don't inline if this is not public or if the
|
||||||
// #[doc(no_inline)] attribute is present.
|
// #[doc(no_inline)] attribute is present.
|
||||||
let denied = self.vis != ast::Public || self.attrs.iter().any(|a| {
|
let denied = self.vis != ast::Public || self.attrs.iter().any(|a| {
|
||||||
|
|
|
@ -376,7 +376,7 @@ pub trait ToCStr {
|
||||||
// (without forcing an additional & around &str). So we are instead
|
// (without forcing an additional & around &str). So we are instead
|
||||||
// temporarily adding an instance for ~str and String, so that we can
|
// temporarily adding an instance for ~str and String, so that we can
|
||||||
// take ToCStr as owned. When DST lands, the string instances should
|
// take ToCStr as owned. When DST lands, the string instances should
|
||||||
// be revisted, and arguments bound by ToCStr should be passed by
|
// be revisited, and arguments bound by ToCStr should be passed by
|
||||||
// reference.
|
// reference.
|
||||||
|
|
||||||
impl<'a> ToCStr for &'a str {
|
impl<'a> ToCStr for &'a str {
|
||||||
|
|
|
@ -97,7 +97,7 @@ extern {}
|
||||||
|
|
||||||
extern "C" {
|
extern "C" {
|
||||||
// iOS on armv7 uses SjLj exceptions and requires to link
|
// iOS on armv7 uses SjLj exceptions and requires to link
|
||||||
// agains corresponding routine (..._SjLj_...)
|
// against corresponding routine (..._SjLj_...)
|
||||||
#[cfg(not(target_os = "ios", target_arch = "arm"))]
|
#[cfg(not(target_os = "ios", target_arch = "arm"))]
|
||||||
pub fn _Unwind_RaiseException(exception: *mut _Unwind_Exception)
|
pub fn _Unwind_RaiseException(exception: *mut _Unwind_Exception)
|
||||||
-> _Unwind_Reason_Code;
|
-> _Unwind_Reason_Code;
|
||||||
|
|
|
@ -170,7 +170,7 @@ impl Task {
|
||||||
/// This function can be used as an emulated "try/catch" to interoperate
|
/// This function can be used as an emulated "try/catch" to interoperate
|
||||||
/// with the rust runtime at the outermost boundary. It is not possible to
|
/// with the rust runtime at the outermost boundary. It is not possible to
|
||||||
/// use this function in a nested fashion (a try/catch inside of another
|
/// use this function in a nested fashion (a try/catch inside of another
|
||||||
/// try/catch). Invoking this funciton is quite cheap.
|
/// try/catch). Invoking this function is quite cheap.
|
||||||
///
|
///
|
||||||
/// If the closure `f` succeeds, then the returned task can be used again
|
/// If the closure `f` succeeds, then the returned task can be used again
|
||||||
/// for another invocation of `run`. If the closure `f` fails then `self`
|
/// for another invocation of `run`. If the closure `f` fails then `self`
|
||||||
|
@ -276,7 +276,7 @@ impl Task {
|
||||||
// 1. If TLD destruction fails, heap destruction will be attempted.
|
// 1. If TLD destruction fails, heap destruction will be attempted.
|
||||||
// There is a test for this at fail-during-tld-destroy.rs. Sadly the
|
// There is a test for this at fail-during-tld-destroy.rs. Sadly the
|
||||||
// other way can't be tested due to point 2 above. Note that we must
|
// other way can't be tested due to point 2 above. Note that we must
|
||||||
// immortalize the heap first becuase if any deallocations are
|
// immortalize the heap first because if any deallocations are
|
||||||
// attempted while TLD is being dropped it will attempt to free the
|
// attempted while TLD is being dropped it will attempt to free the
|
||||||
// allocation from the wrong heap (because the current one has been
|
// allocation from the wrong heap (because the current one has been
|
||||||
// replaced).
|
// replaced).
|
||||||
|
|
|
@ -243,7 +243,7 @@ mod imp {
|
||||||
// EINVAL means |stack_size| is either too small or not a
|
// EINVAL means |stack_size| is either too small or not a
|
||||||
// multiple of the system page size. Because it's definitely
|
// multiple of the system page size. Because it's definitely
|
||||||
// >= PTHREAD_STACK_MIN, it must be an alignment issue.
|
// >= PTHREAD_STACK_MIN, it must be an alignment issue.
|
||||||
// Round up to the neareast page and try again.
|
// Round up to the nearest page and try again.
|
||||||
let page_size = libc::sysconf(libc::_SC_PAGESIZE) as uint;
|
let page_size = libc::sysconf(libc::_SC_PAGESIZE) as uint;
|
||||||
let stack_size = (stack_size + page_size - 1) &
|
let stack_size = (stack_size + page_size - 1) &
|
||||||
(-(page_size as int - 1) as uint - 1);
|
(-(page_size as int - 1) as uint - 1);
|
||||||
|
|
|
@ -234,7 +234,7 @@ impl ForbidUnwind {
|
||||||
impl Drop for ForbidUnwind {
|
impl Drop for ForbidUnwind {
|
||||||
fn drop(&mut self) {
|
fn drop(&mut self) {
|
||||||
assert!(self.failing_before == task::failing(),
|
assert!(self.failing_before == task::failing(),
|
||||||
"didnt want an unwind during: {}", self.msg);
|
"didn't want an unwind during: {}", self.msg);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -87,7 +87,7 @@ impl StreamWatcher {
|
||||||
// immediately as part of the call to alloc_cb. What this means is that
|
// immediately as part of the call to alloc_cb. What this means is that
|
||||||
// we must be ready for this to happen (by setting the data in the uv
|
// we must be ready for this to happen (by setting the data in the uv
|
||||||
// handle). In theory this otherwise doesn't need to happen until after
|
// handle). In theory this otherwise doesn't need to happen until after
|
||||||
// the read is succesfully started.
|
// the read is successfully started.
|
||||||
unsafe { uvll::set_data_for_uv_handle(self.handle, &mut rcx) }
|
unsafe { uvll::set_data_for_uv_handle(self.handle, &mut rcx) }
|
||||||
|
|
||||||
// Send off the read request, but don't block until we're sure that the
|
// Send off the read request, but don't block until we're sure that the
|
||||||
|
|
|
@ -77,7 +77,7 @@ impl RtioTimer for TimerWatcher {
|
||||||
fn sleep(&mut self, msecs: u64) {
|
fn sleep(&mut self, msecs: u64) {
|
||||||
// As with all of the below functions, we must be extra careful when
|
// As with all of the below functions, we must be extra careful when
|
||||||
// destroying the previous action. If the previous action was a channel,
|
// destroying the previous action. If the previous action was a channel,
|
||||||
// destroying it could invoke a context switch. For these situtations,
|
// destroying it could invoke a context switch. For these situations,
|
||||||
// we must temporarily un-home ourselves, then destroy the action, and
|
// we must temporarily un-home ourselves, then destroy the action, and
|
||||||
// then re-home again.
|
// then re-home again.
|
||||||
let missile = self.fire_homing_missile();
|
let missile = self.fire_homing_missile();
|
||||||
|
|
|
@ -410,7 +410,7 @@ mod test {
|
||||||
// colon after v4
|
// colon after v4
|
||||||
let none: Option<IpAddr> = FromStr::from_str("::127.0.0.1:");
|
let none: Option<IpAddr> = FromStr::from_str("::127.0.0.1:");
|
||||||
assert_eq!(None, none);
|
assert_eq!(None, none);
|
||||||
// not enought groups
|
// not enough groups
|
||||||
let none: Option<IpAddr> = FromStr::from_str("1.2.3.4.5:127.0.0.1");
|
let none: Option<IpAddr> = FromStr::from_str("1.2.3.4.5:127.0.0.1");
|
||||||
assert_eq!(None, none);
|
assert_eq!(None, none);
|
||||||
// too many groups
|
// too many groups
|
||||||
|
|
|
@ -469,7 +469,7 @@ pub fn unsetenv(n: &str) {
|
||||||
/// println!("'{}'", path.display());
|
/// println!("'{}'", path.display());
|
||||||
/// }
|
/// }
|
||||||
/// }
|
/// }
|
||||||
/// None => println!("{} is not defined in the environnement.", key)
|
/// None => println!("{} is not defined in the environment.", key)
|
||||||
/// }
|
/// }
|
||||||
/// ```
|
/// ```
|
||||||
pub fn split_paths<T: BytesContainer>(unparsed: T) -> Vec<Path> {
|
pub fn split_paths<T: BytesContainer>(unparsed: T) -> Vec<Path> {
|
||||||
|
|
|
@ -266,7 +266,7 @@ mod imp {
|
||||||
}
|
}
|
||||||
|
|
||||||
// while it doesn't requires lock for work as everything is
|
// while it doesn't requires lock for work as everything is
|
||||||
// local, it still displays much nicier backtraces when a
|
// local, it still displays much nicer backtraces when a
|
||||||
// couple of tasks fail simultaneously
|
// couple of tasks fail simultaneously
|
||||||
static mut LOCK: StaticNativeMutex = NATIVE_MUTEX_INIT;
|
static mut LOCK: StaticNativeMutex = NATIVE_MUTEX_INIT;
|
||||||
let _g = unsafe { LOCK.lock() };
|
let _g = unsafe { LOCK.lock() };
|
||||||
|
|
|
@ -354,7 +354,7 @@ impl<T: Send> Packet<T> {
|
||||||
}
|
}
|
||||||
|
|
||||||
// We woke ourselves up from select. Assert that the task should be
|
// We woke ourselves up from select. Assert that the task should be
|
||||||
// trashed and returne that we don't have any data.
|
// trashed and returned that we don't have any data.
|
||||||
n => {
|
n => {
|
||||||
let t = unsafe { BlockedTask::cast_from_uint(n) };
|
let t = unsafe { BlockedTask::cast_from_uint(n) };
|
||||||
t.trash();
|
t.trash();
|
||||||
|
|
|
@ -81,7 +81,7 @@ impl<T: Send> Packet<T> {
|
||||||
|
|
||||||
// This function should be used after newly created Packet
|
// This function should be used after newly created Packet
|
||||||
// was wrapped with an Arc
|
// was wrapped with an Arc
|
||||||
// In other case mutex data will be duplicated while clonning
|
// In other case mutex data will be duplicated while cloning
|
||||||
// and that could cause problems on platforms where it is
|
// and that could cause problems on platforms where it is
|
||||||
// represented by opaque data structure
|
// represented by opaque data structure
|
||||||
pub fn postinit_lock(&mut self) {
|
pub fn postinit_lock(&mut self) {
|
||||||
|
@ -140,7 +140,7 @@ impl<T: Send> Packet<T> {
|
||||||
// See Port::drop for what's going on
|
// See Port::drop for what's going on
|
||||||
if self.port_dropped.load(atomics::SeqCst) { return Err(t) }
|
if self.port_dropped.load(atomics::SeqCst) { return Err(t) }
|
||||||
|
|
||||||
// Note that the multiple sender case is a little tricker
|
// Note that the multiple sender case is a little trickier
|
||||||
// semantically than the single sender case. The logic for
|
// semantically than the single sender case. The logic for
|
||||||
// incrementing is "add and if disconnected store disconnected".
|
// incrementing is "add and if disconnected store disconnected".
|
||||||
// This could end up leading some senders to believe that there
|
// This could end up leading some senders to believe that there
|
||||||
|
|
|
@ -215,7 +215,7 @@ impl StaticMutex {
|
||||||
None => {}
|
None => {}
|
||||||
}
|
}
|
||||||
|
|
||||||
// After we've failed the fast path, then we delegate to the differnet
|
// After we've failed the fast path, then we delegate to the different
|
||||||
// locking protocols for green/native tasks. This will select two tasks
|
// locking protocols for green/native tasks. This will select two tasks
|
||||||
// to continue further (one native, one green).
|
// to continue further (one native, one green).
|
||||||
let t: Box<Task> = Local::take();
|
let t: Box<Task> = Local::take();
|
||||||
|
|
|
@ -472,7 +472,7 @@ impl<'a> ExtCtxt<'a> {
|
||||||
}
|
}
|
||||||
/// Emit `msg` attached to `sp`, and stop compilation immediately.
|
/// Emit `msg` attached to `sp`, and stop compilation immediately.
|
||||||
///
|
///
|
||||||
/// `span_err` should be strongly prefered where-ever possible:
|
/// `span_err` should be strongly preferred where-ever possible:
|
||||||
/// this should *only* be used when
|
/// this should *only* be used when
|
||||||
/// - continuing has a high risk of flow-on errors (e.g. errors in
|
/// - continuing has a high risk of flow-on errors (e.g. errors in
|
||||||
/// declaring a macro would cause all uses of that macro to
|
/// declaring a macro would cause all uses of that macro to
|
||||||
|
|
|
@ -834,7 +834,7 @@ impl<'a> MethodDef<'a> {
|
||||||
generic `deriving`");
|
generic `deriving`");
|
||||||
}
|
}
|
||||||
|
|
||||||
// `ref` inside let matches is buggy. Causes havoc wih rusc.
|
// `ref` inside let matches is buggy. Causes havoc with rusc.
|
||||||
// let (variant_index, ref self_vec) = matches_so_far[0];
|
// let (variant_index, ref self_vec) = matches_so_far[0];
|
||||||
let (variant, self_vec) = match matches_so_far.get(0) {
|
let (variant, self_vec) = match matches_so_far.get(0) {
|
||||||
&(_, v, ref s) => (v, s)
|
&(_, v, ref s) => (v, s)
|
||||||
|
|
|
@ -1295,7 +1295,7 @@ mod test {
|
||||||
}
|
}
|
||||||
|
|
||||||
// create a really evil test case where a $x appears inside a binding of $x
|
// create a really evil test case where a $x appears inside a binding of $x
|
||||||
// but *shouldnt* bind because it was inserted by a different macro....
|
// but *shouldn't* bind because it was inserted by a different macro....
|
||||||
// can't write this test case until we have macro-generating macros.
|
// can't write this test case until we have macro-generating macros.
|
||||||
|
|
||||||
// FIXME #9383 : lambda var hygiene
|
// FIXME #9383 : lambda var hygiene
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue